Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for prevention of windowless screen capture

a windowless and screen capture technology, applied in the field of computer security, can solve the problem that the user is not able to perform a screen capture when he needs, and achieve the effects of reducing the number of false positive determinations, high security, and improving user experien

Active Publication Date: 2016-04-26
INT BUSINESS MASCH CORP
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present disclosure describes methods and software agents to prevent malicious activity on computer screens. This will improve user experience and maintain high security levels. The methods are simple and efficient, and the software agents are easy to use. Overall, the technology aims to reduce the number of false positive detections and enhance security against screen capture events.

Problems solved by technology

Unfortunately, the screen capture option also opens the door for malware to acquire private information entered by the user on his screen.
Some security software deals with this problem simply by preventing the system from performing a screen capture under a variety of conditions which give rise to suspicion.
However, this approach has the great disadvantage of resulting in many “false positive” identifications of potential malware attacks, which lead to a frustrating situation in which the user is not able to perform a screen capture when he needs to.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for prevention of windowless screen capture
  • Method and system for prevention of windowless screen capture
  • Method and system for prevention of windowless screen capture

Examples

Experimental program
Comparison scheme
Effect test

example

Discriminating Between Malicious and Non-Malicious Processes

[0024]An example of a malicious process is the recently discovered FAKEM RAT (http: / / www.trendmicro.com / cloud-content / us / pdfs / security-intelligence / white-papers / wp-fakem-rat.pdf), which uses its own process (“the malware typically copies itself using the name, tpframe.exe, to the %System% folder”), and is capable of taking screenshots (“takes a snapshot of the desktop”).

[0025]In contrast, various remote management software (e.g. Symantec PC-Anywhere) need to take screenshots of the user's desktop, while (in some cases) not having a visible window at such time.

[0026]By using the exemplary embodiments, it is possible to discriminate between a non-malicious management software, which is identified as non-malicious by its behavior, because at least some of its windows are visible and / or because they have been white-listed and malicious processes. The exemplary embodiments provide a simple and yet efficacious tool to fight malic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for preventing the acquisition of data by a screen capturing malware, comprises preventing an unidentified process that does not open a window from performing screen capture.

Description

FIELD OF THE DISCLOSURE[0001]The present disclosure relates to the field of computer security. More particularly, the disclosure relates to the prevention of the acquisition of private user data by malware that employs screen capture techniques.BACKGROUND OF THE DISCLOSURE[0002]Screen capture is a very useful option available in most computer operating systems and one which the vast majority of users would not be willing to give up. Unfortunately, the screen capture option also opens the door for malware to acquire private information entered by the user on his screen. For instance, when a user accesses a bank account or other sensitive web location, the user may type confidential information into specific fields to acquire access. Malware that is installed on said user's computer can be activated when such a window is displayed and may capture the screen, thus also capturing confidential information that the malware may then forward to its creator.[0003]Some security software deals...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): G06F21/55G06F21/56G06F21/36G06F21/12
CPCG06F21/554G06F21/36G06F21/56G06F21/566G06F21/121G06F2221/032
Inventor KLEIN, AMIT
Owner INT BUSINESS MASCH CORP